Логотип exploitDog
bind:CVE-2025-26866
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-26866

Количество 2

Количество 2

nvd логотип

CVE-2025-26866

около 2 месяцев назад

A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-q37j-3367-fwv7

около 2 месяцев назад

Apache HugeGraph-Server: RAFT and deserialization vulnerability

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-26866

A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue.

CVSS3: 8.8
1%
Низкий
около 2 месяцев назад
github логотип
GHSA-q37j-3367-fwv7

Apache HugeGraph-Server: RAFT and deserialization vulnerability

1%
Низкий
около 2 месяцев назад

Уязвимостей на страницу